Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
15/01/2024, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
5bdd4de824d48d14df40bce7f7709ad1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5bdd4de824d48d14df40bce7f7709ad1.exe
Resource
win10v2004-20231222-en
General
-
Target
5bdd4de824d48d14df40bce7f7709ad1.exe
-
Size
1.3MB
-
MD5
5bdd4de824d48d14df40bce7f7709ad1
-
SHA1
8cc562f26e24660ad2f7a5e88e8172e7718e6bf8
-
SHA256
3afedea501a9bca64d1d400f5e3aa79e1f0d359a035d84569c123d49458425f2
-
SHA512
0d86196c36031429db86134c541fe86c800fcf83765b92b0a66c81e10774f26339dc905fa184107a3871c837fb1c1cb8b518409d0cef3bd3402de820db8c5cba
-
SSDEEP
24576:AAOcZwdf+OD0+t2drJGlFN5SoRS7NVzxYOKdfA/i6A3Xc6z1F/i4:efU8lJS7PKdo43M6z1F/V
Malware Config
Extracted
netwire
harold.ns01.info:3606
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
Netwir
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
pHJVBoFH
-
offline_keylogger
true
-
password
master12
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral2/memory/1008-50-0x0000000000B00000-0x0000000001128000-memory.dmp netwire behavioral2/memory/1008-52-0x0000000000B00000-0x0000000001128000-memory.dmp netwire behavioral2/memory/1008-53-0x0000000000B00000-0x0000000001128000-memory.dmp netwire behavioral2/memory/1008-54-0x0000000000B00000-0x0000000001128000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 5bdd4de824d48d14df40bce7f7709ad1.exe -
Executes dropped EXE 1 IoCs
pid Process 4672 odebgj.pif -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\29240433\\odebgj.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\29240433\\uasn.rru" odebgj.pif -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4672 set thread context of 1008 4672 odebgj.pif 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 3928 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3120 wrote to memory of 4672 3120 5bdd4de824d48d14df40bce7f7709ad1.exe 90 PID 3120 wrote to memory of 4672 3120 5bdd4de824d48d14df40bce7f7709ad1.exe 90 PID 3120 wrote to memory of 4672 3120 5bdd4de824d48d14df40bce7f7709ad1.exe 90 PID 4672 wrote to memory of 1008 4672 odebgj.pif 94 PID 4672 wrote to memory of 1008 4672 odebgj.pif 94 PID 4672 wrote to memory of 1008 4672 odebgj.pif 94 PID 4672 wrote to memory of 1008 4672 odebgj.pif 94 PID 4672 wrote to memory of 1008 4672 odebgj.pif 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bdd4de824d48d14df40bce7f7709ad1.exe"C:\Users\Admin\AppData\Local\Temp\5bdd4de824d48d14df40bce7f7709ad1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\29240433\odebgj.pif"C:\Users\Admin\AppData\Local\Temp\29240433\odebgj.pif" uasn.rru2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1008
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4048
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
576KB
MD5a46a200d2e80ebc156f106e601304954
SHA1076fea4fd2ab73974b99da43c5599477e6b95dbf
SHA25641367c7c673ddb8de61ea04dfbcfe19af713becb4fa443742167964924b12e7e
SHA512e12b826f25803c46fcffe08b5f3db50e99d0ac8575f9021787a9a1ad0949a3b10dac5b267b08d4be709e43ef008928f5a8bcdb2508648ddc5d860669751f97ec
-
Filesize
329KB
MD5217600518a3fe5eabfe659a6fd21526a
SHA1dc966a77251ceb911f4896d15f07432ad40e9321
SHA256d2ee980f32cc95d3fc97020a7f87ec97ae32886ded30028d7ab8bd11522bee2e
SHA512380c421dbcc4b54d4a88c5b96c4998d9590a00e870e6558feda786a8d4b12fdff723eab5c006915311636d797d3f21b6c2035dde0aa38d94cce6de9135697c1e
-
Filesize
379KB
MD57b7eee3744afb2b32646da464c3ffbf7
SHA10dc248b0d126345578c923596589f4ca743458fe
SHA2565356086516db6088fdfa009be3269c82f873a5bf9c48250a01c236c55d2b4529
SHA51252f3a87e718cda89d0b20e4b22f39180738dd17789cb81ed465db9a3cd82f27ad42808dfc61bbdf3fdd50d50bc6775639254f17417c590cef2a258425d480ce0
-
Filesize
8.2MB
MD544efcadff66ff59419e935d780d20968
SHA11226fa389a3b40abf54d6588918d68a4cd1cff3d
SHA256e4e5d9a5c69a56fcd5e688e61bb2055db6d348c1ef1ce6f15aa5caf6c2cb740b
SHA512f4eb71cb23a70b94f8a15a46745b582049c530860169692a0351a0bf887399f6b7c448facd2ebe68889d54b9fe3ecc824caa91ea07ea926ff93499eee29733c2